نتایج جستجو برای: tcb
تعداد نتایج: 465 فیلتر نتایج به سال:
The traditional approaches to building survivable systems assume a framework of absolute trust requiring a provably impenetrable and incorruptible Trusted Computing Base (TCB). Unfortunately, we don’t have TCB’s, and experience suggests
OBJECTIVES To study (i) the incidence and course of jaundice, and (ii) the predictors of significant jaundice in late preterm infants. DESIGN Prospective analytical study. SETTING Urban perinatal center. PATIENTS Inborn late preterm infants (post menstrual age of 34 0/7 to 36 6/7 weeks). METHODS Infants were followed till day 14 of life or till onset of significant jaundice. Relevant ma...
Virtualization has made cloud computing a popular trend by virtue of its elastic “data anywhere” and “computing anywhere”. However, traditional virtualization architectures usually have three drawbacks: 1) being vulnerable to many known attacks targeting at the large software stacks; 2) endowing too much power to cloud providers, who can fully control the Virtual Machine Monitor (VMM) and the m...
Monoclonal antibody (mAb) L8A4, specific for the tumor-associated mutant epidermal growth factor receptor variant III (EGFRvII), is internalized and degraded after cell binding. Four paired-label experiments were performed in athymic mice bearing EGFRvIII-positive xenografts to determine the suitability of N-succinimidyl 3-iodo-5-pyridinecarboxylate (SIPC) for labeling this internalizing mAb. I...
This essay is concerned with trusted system integration and/or development to meet multilevel security (MLS) and operational requirements. It addresses technical issues such as how to combine products securely, TCB alternatives, and typical security engineering phases — as well as the management concerns of certification and accreditation. This essay addresses the integration of multilevel secu...
Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy includes proof rules which determine how various actions are to be proved safe. These proof rules have been considered part of the trusted code base (TCB) of the PCC system. We wish to remove the proof rules from the TCB by provid...
Bioavailability of benzo[a]pyrene (BaP) and 3,3',4,4'-tetrachlorobiphenyl (TCB) was studied in natural lake water containing dissolved organic matter (DOM). Lake water was diluted to give a dissolved organic carbon (DOC) range of 1 to 20 mg/L. Partition coefficients for the model compounds were assessed at different DOM concentrations and over time with three different methods, namely equilibri...
The literature reports mixed results on the imagery abilities of the blind, at times showing a difference between sighted and blind individuals and at other times similarities. However, the possibility that the results are due to different strategies spontaneously used in performing the imagery tasks has never been systematically studied. A large group of 30 totally congenitally blind (TCB) ind...
A security system is only as strong as its weakest link. This observation lead to security architectures that use a small trusted computing base (TCB) to minimize the number of “links” in the system. A small TCB both reduces the chance of a bug occurring by reducing the volume of software that may contain a bug, and also makes formal verification of the correctness of the TCB feasible. Unfortun...
Cu-to-Cu thermal compression bonding (TCB) has emerged as a promising solution for ultrafine pitch packaging in 3D integrated circuit technologies. Despite the progress made by conventional TCB methods achieving good mechanical strength of Cu bonds, processes generally require high temperature and pressure, which may degrade performance reliability device. Therefore, it is imperative to investi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید